-
1
-
-
70350102161
-
Preference ordering in agenda based multi-issue negotiation for service level agreement
-
IEEE Press New York 10.1109/WAINA.2009.168
-
Abedin F, Chao K, Godwin N, Arochena H (2009) Preference ordering in agenda based multi-issue negotiation for service level agreement. In: International conference on Advanced Information Networking and Applications Workshops, 2009. WAINA'09. IEEE Press, New York, pp 19-24
-
(2009)
International Conference on Advanced Information Networking and Applications Workshops, 2009. WAINA'09
, pp. 19-24
-
-
Abedin, F.1
Chao, K.2
Godwin, N.3
Arochena, H.4
-
3
-
-
84855322597
-
Learning opponent's preferences for effective negotiation: An approach based on concept learning
-
10.1007/s10458-010-9147-0 10.1007/s10458-010-9147-0
-
Aydoǧan R, Yolum P (2012) Learning opponent's preferences for effective negotiation: an approach based on concept learning. Auton Agents Multi-Agent Syst 24(1):104-140. doi: 10.1007/s10458-010-9147-0
-
(2012)
Auton Agents Multi-Agent Syst
, vol.24
, Issue.1
, pp. 104-140
-
-
Aydoǧan, R.1
Yolum, P.2
-
4
-
-
84884290796
-
An adaptive approach for decision making tactics in automated negotiation
-
10.1007/s10489-013-0434-8
-
Bahrammirzaee A, Chohra A, Madani K (2013) An adaptive approach for decision making tactics in automated negotiation. Appl Intell. doi: 10.1007/s10489-013-0434-8
-
(2013)
Appl Intell
-
-
Bahrammirzaee, A.1
Chohra, A.2
Madani, K.3
-
6
-
-
80053442845
-
-
Bouckaert RR, Frank E, Hall M, Kirkby R, Reutemann P, Seewald A, Scuse D (2009) Weka manual (3.7.1). http://prdownloads.sourceforge.net/weka/WekaManual- 3-7-1.pdf?download
-
(2009)
Weka Manual (3.7.1)
-
-
Bouckaert, R.R.1
Frank, E.2
Hall, M.3
Kirkby, R.4
Reutemann, P.5
Seewald, A.6
Scuse, D.7
-
8
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
10.1145/4372.4373
-
Chaum D (1985) Security without identification: transaction systems to make big brother obsolete. Commun ACM 28:1030-1044
-
(1985)
Commun ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
11
-
-
85084161366
-
Tor: The second-generation onion router
-
San Diego, CA, USA
-
Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: 13th USENIX security symposium, San Diego, CA, USA, pp 303-320
-
(2004)
13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
12
-
-
84862125890
-
Ontology-based user profile learning
-
10.1007/s10489-011-0301-4
-
Eyharabide V, Amandi A (2012) Ontology-based user profile learning. Appl Intell 36(4):857-869
-
(2012)
Appl Intell
, vol.36
, Issue.4
, pp. 857-869
-
-
Eyharabide, V.1
Amandi, A.2
-
16
-
-
78751526925
-
Benefits of privacy-enhancing identity management
-
Fischer-Hübner S, Hedbom H (2008) Benefits of privacy-enhancing identity management. Asia Pac Bus Rev 10(4):36-52
-
(2008)
Asia Pac Bus Rev
, vol.10
, Issue.4
, pp. 36-52
-
-
Fischer-Hübner, S.1
Hedbom, H.2
-
18
-
-
84876174823
-
A novel method for coevolving ps-optimizing negotiation strategies using improved diversity controlling edas
-
10.1007/s10489-012-0378-4
-
Gwak J, Sim K (2013) A novel method for coevolving ps-optimizing negotiation strategies using improved diversity controlling edas. Appl Intell 38(3):384-417
-
(2013)
Appl Intell
, vol.38
, Issue.3
, pp. 384-417
-
-
Gwak, J.1
Sim, K.2
-
19
-
-
1642281602
-
Privacy-enhancing identity management
-
10.1016/S1363-4127(04)00014-7
-
Hansen M, Berlich P, Camenisch J, Clau S, Pfitzmann A, Waidner M (2004) Privacy-enhancing identity management. Inf Secur Tech Rep 9(1):35-44
-
(2004)
Inf Secur Tech Rep
, vol.9
, Issue.1
, pp. 35-44
-
-
Hansen, M.1
Berlich, P.2
Camenisch, J.3
Clau, S.4
Pfitzmann, A.5
Waidner, M.6
-
20
-
-
41949117635
-
Privacy and identity management
-
10.1109/MSP.2008.41
-
Hansen M, Schwartz A, Cooper A (2008) Privacy and identity management. IEEE Secur Priv 6(2):38-45
-
(2008)
IEEE Secur Priv
, vol.6
, Issue.2
, pp. 38-45
-
-
Hansen, M.1
Schwartz, A.2
Cooper, A.3
-
22
-
-
84899976148
-
Opponent modelling in automated multi-issue negotiation using Bayesian learning
-
Richland, SC 1 International Foundation for Autonomous Agents and Multiagent Systems
-
Hindriks K, Tykhonov D (2008) Opponent modelling in automated multi-issue negotiation using Bayesian learning. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems, AAMAS'08, vol 1, Richland, SC, pp 331-338. International Foundation for Autonomous Agents and Multiagent Systems
-
(2008)
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS'08
, pp. 331-338
-
-
Hindriks, K.1
Tykhonov, D.2
-
23
-
-
0041540817
-
Building consumer trust online
-
10.1145/299157.299175
-
Hoffman D, Novak T, Peralta M (1999) Building consumer trust online. Commun ACM 42(4):80-85
-
(1999)
Commun ACM
, vol.42
, Issue.4
, pp. 80-85
-
-
Hoffman, D.1
Novak, T.2
Peralta, M.3
-
24
-
-
33646594936
-
-
JADE Board
-
JADE Board. Jade security guide (2005). http://jade.tilab.com
-
(2005)
Jade Security Guide
-
-
-
25
-
-
84863022806
-
A new approach to simultaneous localization and map building with implicit model learning using neuro evolutionary optimization
-
10.1007/s10489-010-0257-9
-
Kang J-G, Kim S, An S-Y, Oh S-Y (2012) A new approach to simultaneous localization and map building with implicit model learning using neuro evolutionary optimization. Appl Intell 36(1):242-269
-
(2012)
Appl Intell
, vol.36
, Issue.1
, pp. 242-269
-
-
Kang, J.-G.1
Kim, S.2
An, S.-Y.3
Oh, S.-Y.4
-
26
-
-
84862131568
-
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
-
10.1007/s10489-010-0263-y
-
Khor K-C, Ting C-Y, Phon-Amnuaisuk S (2012) A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection. Appl Intell 36(2):320-329
-
(2012)
Appl Intell
, vol.36
, Issue.2
, pp. 320-329
-
-
Khor, K.-C.1
Ting, C.-Y.2
Phon-Amnuaisuk, S.3
-
27
-
-
84862145454
-
Simultaneous optimization of artificial neural networks for financial forecasting
-
10.1007/s10489-011-0303-2 1736626
-
Kim K-J, Ahn H (2012) Simultaneous optimization of artificial neural networks for financial forecasting. Appl Intell 36(4):887-898
-
(2012)
Appl Intell
, vol.36
, Issue.4
, pp. 887-898
-
-
Kim, K.-J.1
Ahn, H.2
-
30
-
-
0033723856
-
What makes Internet users visit cyber stores again? Key design factors for customer loyalty
-
ACM New York 10.1145/332040.332448
-
Lee J, Kim J, Moon JY (2000) What makes Internet users visit cyber stores again? Key design factors for customer loyalty. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI'00. ACM, New York, pp 305-312
-
(2000)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI'00
, pp. 305-312
-
-
Lee, J.1
Kim, J.2
Moon, J.Y.3
-
31
-
-
84876194131
-
Predicting student failure at school using genetic programming and different data mining approaches with high dimensional and imbalanced data
-
10.1007/s10489-012-0374-8
-
Márquez-Vera C, Cano A, Romero C, Ventura S (2013) Predicting student failure at school using genetic programming and different data mining approaches with high dimensional and imbalanced data. Appl Intell 38(3):315-330
-
(2013)
Appl Intell
, vol.38
, Issue.3
, pp. 315-330
-
-
Márquez-Vera, C.1
Cano, A.2
Romero, C.3
Ventura, S.4
-
32
-
-
0036355110
-
Intellishopper: A proactive, personal, private shopping assistant
-
10.1145/545056.545059
-
Menczer F, Street WN, Vishwakarma N, Monge AE, Jakobsson M (2002) Intellishopper: a proactive, personal, private shopping assistant. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems: part 3, AAMAS'02, pp 1001-1008
-
(2002)
Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 3, AAMAS'02
, pp. 1001-1008
-
-
Menczer, F.1
Street, W.N.2
Vishwakarma, N.3
Monge, A.E.4
Jakobsson, M.5
-
34
-
-
1142268161
-
Privacy, economics, and price discrimination on the Internet
-
ACM New York
-
Odlyzko A (2003) Privacy, economics, and price discrimination on the Internet. In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC'03. ACM, New York, pp 355-366
-
(2003)
Proceedings of the 5th International Conference on Electronic Commerce, ICEC'03
, pp. 355-366
-
-
Odlyzko, A.1
-
36
-
-
78649989557
-
-
Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. v0.34. http://dud.inf.tu-dresden.de/Anon- Terminology.shtml
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. V0.34
-
-
Pfitzmann, A.1
Hansen, M.2
-
37
-
-
80053016826
-
Enforcing security in the agentscape middleware
-
ACM New York 10.1145/1463342.1463347
-
Quillinan TB, Warnier M, Oey M, Timmer R, Brazier F (2008) Enforcing security in the agentscape middleware. In: Proceedings of the 2008 workshop on middleware security, MidSec'08. ACM, New York, pp 25-30
-
(2008)
Proceedings of the 2008 Workshop on Middleware Security, MidSec'08
, pp. 25-30
-
-
Quillinan, T.B.1
Warnier, M.2
Oey, M.3
Timmer, R.4
Brazier, F.5
-
39
-
-
80052831765
-
-
Recursion Software Inc. http://www.recursionsw.com/
-
Recursion Software Inc. (2008) Voyager security guide. http://www.recursionsw.com/
-
(2008)
Voyager Security Guide
-
-
-
40
-
-
84964039818
-
Concepts and architecture of a security-centric mobile agent server
-
Roth V, Jalali-Sohi M (2001) Concepts and architecture of a security-centric mobile agent server. In: ISADS
-
(2001)
ISADS
-
-
Roth, V.1
Jalali-Sohi, M.2
-
41
-
-
70349425619
-
Intelligent data analysis applied to debug complex software systems
-
10.1016/j.neucom.2008.10.025
-
Serrano E, Gómez-Sanz JJ, Botia JA, Pavón J (2009) Intelligent data analysis applied to debug complex software systems. Neurocomputing 72(13-15):2785-2795
-
(2009)
Neurocomputing
, vol.72
, Issue.13-15
, pp. 2785-2795
-
-
Serrano, E.1
Gómez-Sanz, J.J.2
Botia, J.A.3
Pavón, J.4
-
42
-
-
71849094330
-
Debugging complex software systems by means of pathfinder networks
-
10.1016/j.ins.2009.11.007
-
Serrano E, Quirin A, Botia J, Cordón O (2010) Debugging complex software systems by means of pathfinder networks. Inf Sci 180(5):561-583
-
(2010)
Inf Sci
, vol.180
, Issue.5
, pp. 561-583
-
-
Serrano, E.1
Quirin, A.2
Botia, J.3
Cordón, O.4
-
43
-
-
84861577660
-
An approach to debug interactions in multi-agent system software tests
-
10.1016/j.ins.2012.04.001
-
Serrano E, Muñoz A, Botia J (2012) An approach to debug interactions in multi-agent system software tests. Inf Sci 205:38-57
-
(2012)
Inf Sci
, vol.205
, pp. 38-57
-
-
Serrano, E.1
Muñoz, A.2
Botia, J.3
-
44
-
-
84899427515
-
A qualitative reputation system for multiagent systems with protocol-based communication
-
Richland, SC 1 International Foundation for Autonomous Agents and Multiagent Systems
-
Serrano E, Rovatsos M, Botia J (2012) A qualitative reputation system for multiagent systems with protocol-based communication. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems, AAMAS'12, vol 1, Richland, SC, pp 307-314. International Foundation for Autonomous Agents and Multiagent Systems
-
(2012)
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, AAMAS'12
, pp. 307-314
-
-
Serrano, E.1
Rovatsos, M.2
Botia, J.3
-
45
-
-
84874116488
-
Data mining agent conversations: A qualitative approach to multiagent systems analysis
-
10.1016/j.ins.2012.12.019
-
Serrano E, Rovatsos M, Botía JA (2013) Data mining agent conversations: a qualitative approach to multiagent systems analysis. Inf Sci 230(0):132-146
-
(2013)
Inf Sci
, vol.230
, Issue.0
, pp. 132-146
-
-
Serrano, E.1
Rovatsos, M.2
Botía, J.A.3
-
46
-
-
84876167129
-
Mining interesting user behavior patterns in mobile commerce environments
-
10.1007/s10489-012-0379-3
-
Shie B-E, Yu P, Tseng V (2013) Mining interesting user behavior patterns in mobile commerce environments. Appl Intell 38(3):418-435
-
(2013)
Appl Intell
, vol.38
, Issue.3
, pp. 418-435
-
-
Shie, B.-E.1
Yu, P.2
Tseng, V.3
-
47
-
-
84961371345
-
A framework for argumentation-based negotiation
-
M. Singh A.S. Rao M. Wooldridge (eds) Lecture notes in computer science 1365 Springer Berlin
-
Sierra C, Jennings NR, Noriega P, Parsons S (1997) A framework for argumentation-based negotiation. In: Singh MP, Rao AS, Wooldridge M (eds) ATAL. Lecture notes in computer science, vol 1365. Springer, Berlin, pp 177-192
-
(1997)
ATAL
, pp. 177-192
-
-
Sierra, C.1
Jennings, N.R.2
Noriega, P.3
Parsons, S.4
-
48
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about organizational practices
-
10.2307/249477
-
Smith HJ, Milberg SJ (1996) Information privacy: measuring individuals' concerns about organizational practices. MIS Q 20:167-196
-
(1996)
MIS Q
, vol.20
, pp. 167-196
-
-
Smith, H.J.1
Milberg, S.J.2
-
49
-
-
33644925852
-
A taxonomy of privacy
-
10.2307/40041279
-
Solove D (2006) A taxonomy of privacy. Univ PA Law Rev 154(3):477
-
(2006)
Univ PA Law Rev
, vol.154
, Issue.3
, pp. 477
-
-
Solove, D.1
-
52
-
-
84867541094
-
-
PhD thesis, Departament de Sistemes Informàtics i Computació, Universitat Politècnica de València
-
Such JM (2011) Enhancing Privacy in Multi-agent Systems. PhD thesis, Departament de Sistemes Informàtics i Computació, Universitat Politècnica de València
-
(2011)
Enhancing Privacy in Multi-agent Systems
-
-
Such, J.M.1
-
53
-
-
80052866365
-
A group-oriented secure multiagent platform
-
10.1002/spe.1042
-
Such JM, Alberola JM, Espinosa A, García-Fornes A (2011) A Group-oriented Secure Multiagent Platform. Softw Pract Exp 41(11):1289-1302
-
(2011)
Softw Pract Exp
, vol.41
, Issue.11
, pp. 1289-1302
-
-
Such, J.M.1
Alberola, J.M.2
Espinosa, A.3
García-Fornes, A.4
-
54
-
-
80052264832
-
Partial identities as a foundation for trust and reputation
-
10.1016/j.engappai.2011.06.008
-
Such JM, Espinosa A, García-Fornes A, Botti V (2011) Partial identities as a foundation for trust and reputation. Eng Appl Artif Intell 24(7):1128-1136
-
(2011)
Eng Appl Artif Intell
, vol.24
, Issue.7
, pp. 1128-1136
-
-
Such, J.M.1
Espinosa, A.2
García-Fornes, A.3
Botti, V.4
-
55
-
-
84900031982
-
A survey of privacy in multi-agent systems
-
10.1017/S0269888913000180
-
Such JM, Espinosa A, García-Fornes A (2013) A Survey of Privacy in Multi-agent Systems. Knowl Eng Rev. doi: 10.1017/S0269888913000180
-
(2013)
Knowl Eng Rev
-
-
Such, J.M.1
Espinosa, A.2
García-Fornes, A.3
-
56
-
-
84870065709
-
Magentix2: A privacy-enhancing agent platform
-
10.1016/j.engappai.2012.06.009
-
Such JM, García-Fornes A, Espinosa A, Bellver J (2013) Magentix2: a privacy-enhancing agent platform. Eng Appl Artif Intell 26(1):96-109
-
(2013)
Eng Appl Artif Intell
, vol.26
, Issue.1
, pp. 96-109
-
-
Such, J.M.1
García-Fornes, A.2
Espinosa, A.3
Bellver, J.4
-
61
-
-
77649111174
-
Anonymity services for multi-agent systems
-
Warnier M, Brazier F (2010) Anonymity services for multi-agent systems. Web Intell Agent Syst 8(2):219-232
-
(2010)
Web Intell Agent Syst
, vol.8
, Issue.2
, pp. 219-232
-
-
Warnier, M.1
Brazier, F.2
-
62
-
-
0038803983
-
Social and political dimensions of privacy
-
10.1111/1540-4560.00072
-
Westin A (2003) Social and political dimensions of privacy. J Soc Issues 59(2):431-453
-
(2003)
J Soc Issues
, vol.59
, Issue.2
, pp. 431-453
-
-
Westin, A.1
-
63
-
-
84894906771
-
-
Wine
-
Wine (2009). http://www.w3.org/TR/2004/REC-owl-guide-20040210/wine.rdf
-
(2009)
-
-
-
65
-
-
0242334211
-
Adk: An agent development kit based on a formal design model for multi-agent systems
-
10.1023/A:1025859021913
-
Xu H, Shatz SM (2003) Adk: an agent development kit based on a formal design model for multi-agent systems. Autom Softw Eng 10:337-365
-
(2003)
Autom Softw Eng
, vol.10
, pp. 337-365
-
-
Xu, H.1
Shatz, S.M.2
|